{"id":"https://openalex.org/W4310834695","doi":"https://doi.org/10.1109/wincom55661.2022.9966457","title":"Review on Machine Learning Based Intrusion Detection for MANET Security","display_name":"Review on Machine Learning Based Intrusion Detection for MANET Security","publication_year":2022,"publication_date":"2022-10-26","ids":{"openalex":"https://openalex.org/W4310834695","doi":"https://doi.org/10.1109/wincom55661.2022.9966457"},"language":"en","primary_location":{"id":"doi:10.1109/wincom55661.2022.9966457","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wincom55661.2022.9966457","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 9th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003328696","display_name":"Wafa Bouassaba","orcid":null},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Wafa Bouassaba","raw_affiliation_strings":["Computer Science and Smart Systems Laboratory, Hassan II University of Casablanca,EST, ENSEM,Casablanca,Morocco","EST, ENSEM, Computer Science and Smart Systems Laboratory, Hassan II University of Casablanca, Casablanca, Morocco"],"affiliations":[{"raw_affiliation_string":"Computer Science and Smart Systems Laboratory, Hassan II University of Casablanca,EST, ENSEM,Casablanca,Morocco","institution_ids":["https://openalex.org/I99297268"]},{"raw_affiliation_string":"EST, ENSEM, Computer Science and Smart Systems Laboratory, Hassan II University of Casablanca, Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022886555","display_name":"Abdellah Nabou","orcid":"https://orcid.org/0000-0003-2119-1638"},"institutions":[{"id":"https://openalex.org/I119856527","display_name":"Cadi Ayyad University","ror":"https://ror.org/04xf6nm78","country_code":"MA","type":"education","lineage":["https://openalex.org/I119856527"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Abdellah Nabou","raw_affiliation_strings":["LISI Laboratory, Cadi Ayyad University Marrakech,Faculty of Sciences Semlalia,Marrakech,Morocco","Faculty of Sciences Semlalia, LISI Laboratory, Cadi Ayyad University Marrakech, Marrakech, Morocco"],"affiliations":[{"raw_affiliation_string":"LISI Laboratory, Cadi Ayyad University Marrakech,Faculty of Sciences Semlalia,Marrakech,Morocco","institution_ids":["https://openalex.org/I119856527"]},{"raw_affiliation_string":"Faculty of Sciences Semlalia, LISI Laboratory, Cadi Ayyad University Marrakech, Marrakech, Morocco","institution_ids":["https://openalex.org/I119856527"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052021792","display_name":"Mohammed Ouzzif","orcid":"https://orcid.org/0000-0003-1100-0228"},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mohammed Ouzzif","raw_affiliation_strings":["Computer Science and Smart Systems Laboratory, Hassan II University of Casablanca,EST, ENSEM,Casablanca,Morocco","EST, ENSEM, Computer Science and Smart Systems Laboratory, Hassan II University of Casablanca, Casablanca, Morocco"],"affiliations":[{"raw_affiliation_string":"Computer Science and Smart Systems Laboratory, Hassan II University of Casablanca,EST, ENSEM,Casablanca,Morocco","institution_ids":["https://openalex.org/I99297268"]},{"raw_affiliation_string":"EST, ENSEM, Computer Science and Smart Systems Laboratory, Hassan II University of Casablanca, Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5003328696"],"corresponding_institution_ids":["https://openalex.org/I99297268"],"apc_list":null,"apc_paid":null,"fwci":0.4574,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.61319093,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8245086073875427},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.7925609350204468},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5755255818367004},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5618889331817627},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5535064339637756},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5321150422096252},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5303953886032104},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.514656662940979},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.510001540184021},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5050671696662903},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.49575290083885193},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4176040589809418},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.1501697301864624},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1040780246257782}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8245086073875427},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.7925609350204468},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5755255818367004},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5618889331817627},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5535064339637756},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5321150422096252},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5303953886032104},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.514656662940979},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.510001540184021},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5050671696662903},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.49575290083885193},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4176040589809418},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.1501697301864624},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1040780246257782},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wincom55661.2022.9966457","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wincom55661.2022.9966457","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 9th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W116116218","https://openalex.org/W1901832985","https://openalex.org/W1986199446","https://openalex.org/W2107397716","https://openalex.org/W2520957171","https://openalex.org/W2552493337","https://openalex.org/W2569775632","https://openalex.org/W2774234451","https://openalex.org/W2808689381","https://openalex.org/W2942687975","https://openalex.org/W2954965474","https://openalex.org/W2980159050","https://openalex.org/W2996046196","https://openalex.org/W3037026157","https://openalex.org/W3045512821","https://openalex.org/W3093621053","https://openalex.org/W3120265455","https://openalex.org/W3133645544","https://openalex.org/W3156701580","https://openalex.org/W3164393743","https://openalex.org/W3166136257","https://openalex.org/W3166534776","https://openalex.org/W3167228939","https://openalex.org/W3184998487","https://openalex.org/W3186595978","https://openalex.org/W3191293076","https://openalex.org/W3193784420","https://openalex.org/W4200107196","https://openalex.org/W4226127777","https://openalex.org/W4297796727"],"related_works":["https://openalex.org/W3035283282","https://openalex.org/W2364523259","https://openalex.org/W2768875466","https://openalex.org/W1975978427","https://openalex.org/W1591014886","https://openalex.org/W2551975114","https://openalex.org/W2025838880","https://openalex.org/W1581687089","https://openalex.org/W2003275014","https://openalex.org/W4210799434"],"abstract_inverted_index":{"Recently,":[0],"the":[1,36,39,44,61,73,83,123,131],"mobile":[2],"ad":[3],"hoc":[4],"network":[5],"(MANET)":[6],"has":[7],"enjoyed":[8],"a":[9],"great":[10],"reputation":[11],"thanks":[12],"to":[13,23,89,115,129],"its":[14],"advantages":[15],"such":[16,65],"as:":[17],"high":[18],"performance,":[19],"no":[20],"expensive":[21],"infrastructure":[22],"install,":[24],"use":[25],"of":[26,33,41,46,63,75,125],"unlicensed":[27],"frequency":[28],"spectrum,":[29],"and":[30,51,106],"fast":[31],"distribution":[32],"information":[34],"around":[35],"transmitter.":[37],"But":[38],"topology":[40],"MANETs":[42,97],"attracts":[43],"attention":[45],"several":[47],"attacks.":[48,79],"Although":[49],"authentication":[50],"encryption":[52],"techniques":[53,67],"can":[54],"provide":[55],"some":[56],"protection,":[57],"especially":[58],"by":[59],"minimizing":[60],"number":[62],"intrusions,":[64],"cryptographic":[66],"do":[68],"not":[69],"work":[70],"effectively":[71],"in":[72,96],"case":[74],"unseen":[76],"or":[77,121],"unknown":[78],"In":[80,110],"this":[81,111],"case,":[82],"machine":[84],"learning":[85],"approach":[86],"is":[87],"successful":[88],"detect":[90],"unfamiliar":[91],"intrusive":[92],"behavior.":[93],"Security":[94],"methodologies":[95],"mainly":[98],"focus":[99],"on":[100],"eliminating":[101],"malicious":[102],"attacks,":[103],"misbehaving":[104],"nodes,":[105],"providing":[107],"secure":[108,130],"routing.":[109],"paper":[112],"we":[113],"present":[114],"most":[116],"recent":[117],"works":[118],"that":[119],"propose":[120],"apply":[122],"concept":[124],"Machine":[126],"Learning":[127],"(ML)":[128],"MANET":[132],"environment.":[133]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
